It happens so innocently: an employee logs into email, sees a message that his password needs to be updated in Outlook and clicks on the link provided. But the email wasn’t generated by Microsoft, it was sent from a cybercriminal who had an email address that looked legitimate. Suddenly, an attack has been launched on your employee and your firm.

The time is now to better understand your firm’s weaknesses. What systems are vulnerable? How can you best secure the environment? How can you best secure data stored in the cloud? How can you best secure on-premises infrastructure? How do you secure your firm’s general computing environment?

On Thursday, March 30, 2017, we will host Tom DeSot, Chief Information Office at our partner Digital Defense, Inc., for a discussion of penetration scanning, testing and training. Register to join us now!

Law firms across the globe are consistently implementing vulnerability scanning

Thanks to many recent well-known security breaches, a desire has arisen to better understand law firm and professional service organizations’ information network vulnerabilities. What systems are vulnerable? How can we best secure the environment if we don’t know all the vulnerabilities? How can we best secure our data stored in the cloud? How do we know when we’re being hacked? How can we best secure our on-premises infrastructure? How do we secure my general computing environment? Are there systems we don’t even know about – a whole rogue IT infrastructure?